TITLE:
avast! Anti-Virus Engine Malformed ZIP/CAB Archive Virus 
Detection
Bypass

SECUNIA ADVISORY ID:
SA17126

VERIFY ADVISORY:
http://secunia.com/advisories/17126/

CRITICAL:
Not critical

IMPACT:
Security Bypass

WHERE:
>From remote

SOFTWARE:
avast! for Kerio 4.x
http://secunia.com/product/5852/

DESCRIPTION:
fRoGGz has discovered a weakness in avast! Anti-Virus scan 
engine,
which can be exploited by malware to bypass certain scanning
functionality.

The weakness is caused due to an error in parsing certain 
malformed
archives and can be exploited via a specially crafted archive 
with
additional characters prepended to the header. Such malformed
archives can be correctly extracted by some archiving software.

Successful exploitation allows malware packed in malformed 
archives
to pass the email anti-virus scanning gateway undetected.

The weakness has been confirmed in avast! for Kerio version 
4.6.313
(Vps 0541-1) when scanning an email containing malformed ".zip" 
and
".cab" archives. Other versions may also be affected.

NOTE: This is not an issue on client systems, as the malware is 
still
detected upon execution by the desktop on-access scanner.

SOLUTION:
Desktop on-access scanner should be used to ensure that the 
malware
is detected upon extraction.

Filter all compressed file archives at border gateways if they 
are
not required.

ORIGINAL ADVISORY:
http://shadock.net/secubox/AVCraftedArchive.html
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to